Phishing is a type of cyber attack in which the attacker attempts to obtain your private information using fraudulent websites and spoofed emails. Typically, a phisher will send a legitimate looking email that claims to come from a company which you have an account with, such as a bank or social network.
Six ways to protect yourself from a phishing attack
15 Tips for Online Safety & Security

With more and more people gaining access to the Internet every day, the importance of ensuring that you and your information remain secure while using the Internet for personal or business reasons cannot be stressed enough. Cyber attacks, viruses, malware, and unwanted intrusions into “secure” computing systems occur frequently and these issues cannot be completely eradicated.
5 Mistakes That Expose Businesses to Cyber Crime
Cyber-crime: How to Protect Your Company’s Data
Cyber Security – Essential Advice for Small Businesses

Small business owners rely on the Internet for everything from ordering stock to keeping in touch with customers. Unfortunately this brings exposure to the increasing threat of cyber security. In addition to stealing money by fraud and deception, cyber criminals may set out to damage your reputation or put you out of business completely.
How Secure Passwords Can Help Prevent Cyber Crime

Data breaches and other forms of cyber-crime have hit the headlines in recent months. Criminal gangs have realized that it can be easier to make money from hacking than from drug dealing and more established crimes. This trend represents a serious threat to anyone who uses a computer, tablet device, or smartphone.
Identify Cyber Security Threats

Cyber criminals don't sit still. While IT professionals develop defenses for recent attacks, criminals develop new ways to attack. Businesses can't just install security software, train employees, and then relax. It is vital for IT professionals to keep up with cyber security trends to avoid increasingly sophisticated assaults.
5 Things That Affect Cyber Security In Small Businesses

Business computers and servers are being compromised more frequently, and good security policies are essential. Lax employee security habits are often a contributing factor in hackers gaining access to sensitive business information. Being a small business owner is challenging, and you have invested time, money, energy, and heart into building your company.
The need for an IT Security Framework

In every business whether it be manufacturing, law, non-profit or healthcare there exists a need for Standard Operating Procedures. These procedures outline how to react to events, how to perform business functions, and reference material if required. In IT Security standard operating procedures are written by institutions or government organizations as recommendations or a framework on how to adequately secure your network.
Why Is It Important to Monitor Privileged User Accounts?

Many business owners understand how important privileged user accounts are. After all, it's a great way of establishing a hierarchy that goes hand in hand with today's technological advancements, and it ensures the data your company handles is secure, since nobody with unauthorized access gets to compromise it.